google-site-verification: googlebaca44933768a824.html Detecting VAD hidden pages - Old Royal Hack Forum

Announcement

Collapse
No announcement yet.

Detecting VAD hidden pages

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Detecting VAD hidden pages

    Concept:

    1) Walk process memory with VirtualQuery
    2) Inject a small 4kb module into process
    3) Setup an exception handler ( VEH preferable )
    4) Using shared memory or some other extremely hood method of external process communication, touch each page's start. ( no homo / no pedo )
    5) If no exception is generated check VirtualQuery again to make sure shit didn't change on us. Alternatively call VirtualProtect or some other shit. Make sure also the exception was an access violation specifically.
    6) If this page is Mr. not fucking listed. Goddamn it some mega fag is homo enabling. Use extremely hood methods to tell the server to fuck this nigga up. Then pray to Allah to send Cho to make this infidel submit.
    7) Make sure to release the page back into the wild regardless of whether an exception was generated or not. Touching it releases it from the deep. VirtualUnlock + VirtualFree.
    8) ???
    9) Profit

    Shortfalls: TRON, Hypervisiors, ring 0/3 VQ/VP etc hooks, hidden GUARD/NOACCESS pages that serve as alert pages, etc. New VEH installed by hack. etc etc

    Other thoughts: VirtualLock possibly. Randomly touch a page ( no homo / no pedo ). SUSPEND ALL THREADS

    Concept #2:

    1) Walk a process memory with VirtualQuery
    2) Choose all uncommited regions
    3) Randomly pick an uncommitted region and allocate it and the full size with VirtualAlloc with at least PAGE_READWRITE. Make sure you use VirtualQuery again to check if it was committed before you do anything.
    4) Write to that region and check in the game process whether we were successful or not, also call NtReadVirtualMemory from our other process as a dual check
    5) VirtualFree the allocated region ( if the region was previously reserved send it back to that state ), and repeat 1-5 until all non committed regions were taken care of.
    6) ???
    7) Profit

    Shortfalls: TRON, Hypervisiors, temporarily increasing the working set of a process and maybe stealing execution time and cache kills, another thread allocating same region, etc

    Bypassing both scans preferably?

    Concept:

    1) Hook VirtualAlloc, VirtualFree, VirtualQuery, VirtualProtect, ReadProcessMemory, etc in kernel mode
    2) Use your driver to hook the IDT
    3) Allocate a large region for shadow pages to redirect any I/O to, MAKE SURE TO KEEP IT ALIGNED TO THE RESERVED REGION you are hiding in
    What this means is that if the reserved region you are hiding in is 100 pages, your shadow region must also be 100 pages.
    4) Desync the TLB for your page(s), add exception to the usermode code that you need to and everything else gets the shadow page
    5) ???
    6) Profit

    Note: I have omitted a few steps, but I think this is sufficient to stop serious contenders.

    Concept #2:

    1) Undo all hooks.
    2) Send hack into kernelmode or into other region heavily encrypted
    3) Wait for scan to subside.
    4) Once scan has subsided, redo hooks, reallocate and reload
    5) ???
    6) Profit

    Note: This method is potentially unstable/unsafe as far as execution is concerned. If you have code executing in your memory region while the scan hits you, only prayer is to possibly send their scan into a deadlock while you finish executing then protect your region. In other words: a race condition.

    #2
    Re: Detecting VAD hidden pages

    Only thing that was left unclear is how to touch pages in a non-homofaggot'ish / pedo'ish way? Could you elaborate more over this subject?
    The last thing I want to do is contribute towards homosexual plans to destroy nohomo and all that's holy in this world.
    lolmaoman: Germans are born with a lifetime x22 login engraved into their birth certificates. True story.
    I DONT HAVE TEAMVIEWER AND IM NOT GOING TO GIVE ANY 24/7 ONLINE SUPPORT VIA STEAM, XFIRE OR OTHER IM PROGRAMS SO DONT BOTHER ASKING. THANKS.

    Comment


      #3
      Re: Detecting VAD hidden pages

      coool shit you got over here
      ok bai

      Comment


        #4
        Re: Detecting VAD hidden pages

        Originally posted by mencore View Post
        Only thing that was left unclear is how to touch pages in a non-homofaggot'ish / pedo'ish way? Could you elaborate more over this subject?
        The last thing I want to do is contribute towards homosexual plans to destroy nohomo and all that's holy in this world.
        Embed the ASCII string "I swear before the one true God, Allah that I shall not touch this page in a homofaggot enabling or pedophile way.", into the function that touches the page. Then it shall be no homo / no pedo.

        Comment


          #5
          Re: Detecting VAD hidden pages

          Originally posted by redbulli
          I don?t even know what this thread is about :-[
          IF IM NOT TALKING OUT OF MY ASS HERE :

          What wav described here can be used to detected manually mapped modules, simplified manual mapping is a way to write your DLL (hake!) to target process without leaving entry of it to "PEB-list" that anticheat for example can use to locate your module.

          This could be used for example in an anticheat or antivirus software to detect rogue modules that have been mapped using "manual mapping technology". I've never seen this done before and if wav were my son I would give him extra Valium for supper in dat trailerpark, I'm sure BurtonJ would too!

          Originally posted by wav View Post
          Embed the ASCII string "I swear before the one true God, Allah that I shall not touch this page in a homofaggot enabling or pedophile way.", into the function that touches the page. Then it shall be no homo / no pedo.
          thanks
          lolmaoman: Germans are born with a lifetime x22 login engraved into their birth certificates. True story.
          I DONT HAVE TEAMVIEWER AND IM NOT GOING TO GIVE ANY 24/7 ONLINE SUPPORT VIA STEAM, XFIRE OR OTHER IM PROGRAMS SO DONT BOTHER ASKING. THANKS.

          Comment


            #6
            Re: Detecting VAD hidden pages

            Originally posted by mencore View Post
            whole lotta text
            no



            If we were talking of manual mapped modules:

            Concept:
            1) Walk all process memory with VirtualQuery, remember we want regions marked MEM_COMMIT.
            2) If the region is MEM_PRIVATE, check the allocation size and protections, making sure to take into account whether the image is DEP enabled or not.
            3) If the image supports DEP and it's on, we can safely assume that any manual mapped modules must have executable flags in their region. If not, check any page with at least PAGE_READONLY protections.
            4) Run through looking for signs of code, strings, imports, really anything.
            5) Hash, Process, Sent to server
            6) ???
            7) Profit.

            Comment


              #7
              Re: Detecting VAD hidden pages

              Alien coders again !!

              Contact:





              !8m:67%;<51>^5T0-7Nb2cIt-C|229/q]Ps67812
              HW: v3n0m4, Mattdog, Xeder
              yO.-(3_=4%Z*Y;<)gsqH_!"5"{_B?34dok&@_91;


              Comment


                #8
                Re: Detecting VAD hidden pages

                I'll spell it out black and white: this is for detecting memory pages that were hidden by hooking kernel function (like EA Vaccine).

                It works by seeing what memory a process external to the target process can see and comparing it to the memory that is seen internally to the process. If a hack hooks user-mode functions like VirtualQuery et al. within the target process or sets up a VEH, it can stop this method from working.

                Comment


                  #9
                  Re: Detecting VAD hidden pages

                  Originally posted by Ember View Post
                  I'll spell it out black and white: this is for detecting memory pages that were hidden by hooking kernel function (like EA Vaccine).
                  Correct, this worked against a number of hack sites whose drivers hid pages in usermode or *tried* to.

                  It works by seeing what memory a process external to the target process can see and comparing it to the memory that is seen internally to the process. If a hack hooks user-mode functions like VirtualQuery et al. within the target process or sets up a VEH, it can stop this method from working.
                  More than just really hooking to stop this method, it requires you to forge results. Remember that you can hide pages from the view by modifying the VAD tree without hooking ZwQueryVirtualMemory. Instead of returning MEM_RESERVED or whatever, you return MEM_COMMIT, the flipside is now the anti cheat code knows that a page is loaded and this could present a problem if the anti cheat is well designed. As far as the the VEH is concerned there are better ways to prevent the usermode code from ever being called without setting up a suspicious VEH of your own. Think back to the fact that when an exception is generated a context switch occurs and what subsequently happens. It's merely listed as a shortfall in the case that someone should design this and forget to make sure their VEH is top level.

                  I suppose I should also notate that I butchered one important step in VAD detection and that is to call VirtualAlloc on the region we are scanning.

                  Comment


                    #10
                    Re: Detecting VAD hidden pages

                    Why the fuck are 60% of people posting here saying they don't understand this shit. Increasin poast cownt tu ower ninetousent

                    i search a good source code for Dods with aimbot and other stuff i know this is the same engine as counter strike source but css hacks are not work in dods.

                    Comment


                      #11
                      Re: Detecting VAD hidden pages

                      Originally posted by floxy View Post
                      Why the fuck are 60% of people posting here saying they don't understand this shit. Increasin poast cownt tu ower ninetousent
                      +1

                      10chars

                      Comment


                        #12
                        Re: Detecting VAD hidden pages

                        Originally posted by floxy View Post
                        Why the fuck are 60% of people posting here saying they don't understand this shit. Increasin poast cownt tu ower ninetousent
                        Agreed, levels of homofaggotry have raised to phenomenal values.
                        Let's clean it up little bit.
                        lolmaoman: Germans are born with a lifetime x22 login engraved into their birth certificates. True story.
                        I DONT HAVE TEAMVIEWER AND IM NOT GOING TO GIVE ANY 24/7 ONLINE SUPPORT VIA STEAM, XFIRE OR OTHER IM PROGRAMS SO DONT BOTHER ASKING. THANKS.

                        Comment


                          #13
                          Re: Detecting VAD hidden pages

                          bumping this bitch

                          i just remembered that if all threads of execution are suspended in a process shit gets sent to the paging file, presuming you haven't disabled paging ( i shouldnt have to mention this, but knowing someone, they're gonna say it )

                          also cocks
                          Last edited by wav; 01-13-2013, 03:01 AM. Reason: post pended further data points that may challenge accepted suppositions

                          Comment


                            #14
                            Re: Detecting VAD hidden pages

                            yep forged results is best results free memory ftw






                            gibs coins @
                            1KatP9B8KG7mvcoFhdLGua1isG88nYZE8C

                            Comment


                              #15
                              Re: Detecting VAD hidden pages

                              Originally posted by νзηοма View Post
                              yep forged results is best results free memory ftw
                              Or just do a blue pill and say giap de phuc dat.

                              Anti cheats can't exactly do hypervisior so we are at an advantage. Bypass the patchguard then engorge your phallus by installing ring-1 shit in the hood.

                              Beware of snitches and bithches violating a real nigga by searching the hd for your shit. protip: store shit on flash drive or encrypt it or stream or some shit, then cleanup
                              all fucking entries, registry, temp, prefetch etc. also hide your patchguard bypass by fooling the noobs eg, if using fyrre bypass, when they are teh query files or boot shit send them into the qwn with fake gold rangs.

                              Do all the regular hood shit by hiding and swallowing your rocks when the cops come around or some shit.
                              Last edited by wav; 01-16-2013, 01:28 AM.

                              Comment


                                #16
                                Re: Detecting VAD hidden pages

                                If you only touch the start of a page, your method would be bypassable by using HWBP on the start of the protected pages. As soon as a Breakpoint triggers, just throw an access violation. This is why you should touch the pages some random bytes in. Also NO PEDO/NO HOMO...

                                Comment


                                  #17
                                  Re: Detecting VAD hidden pages

                                  Originally posted by InUrFace1337 View Post
                                  If you only touch the start of a page, your method would be bypassable by using HWBP on the start of the protected pages. As soon as a Breakpoint triggers, just throw an access violation. This is why you should touch the pages some random bytes in. Also NO PEDO/NO HOMO...
                                  New VEH installed by hack covers this avenue bud. I already thought of that. Even so, let's play a mind game here. What stop big mega fag disabler anti cheat v666 from placing HWBPs that trip and send back EIP + exception code + return code to main server? Nothing. So you can try to use HWBP but then you face possibilty AC coder is not an idiot and using some super advanced server algo violates a fake nigga by placing shit and trigger shit randomly.

                                  Result? You're on the table getting your ass probed for hemorrhoids.

                                  Comment


                                    #18
                                    Re: Detecting VAD hidden pages

                                    But what if i did not hack?

                                    i search a good source code for Dods with aimbot and other stuff i know this is the same engine as counter strike source but css hacks are not work in dods.

                                    Comment


                                      #19
                                      Re: Detecting VAD hidden pages

                                      Originally posted by floxy View Post
                                      But what if i did not hack?
                                      Ain't nothin' to worry bout boy! Unless y'all enablin' homos.

                                      Comment


                                        #20
                                        Re: Detecting VAD hidden pages

                                        Gets the data execution prevention (DEP) and DEP-ATL thunk emulation settings for the specified 32-bit process.Windows XP with SP3:  Gets the DEP and DEP-ATL thunk emulation settings for the current process.


                                        fancy wording for NtQueryInformationProcess with process class 0x22

                                        herple derple trebek, on xp sp3 you have to inject into other processes unless using service driver
                                        Last edited by wav; 01-22-2013, 05:06 AM. Reason: microsoft decides differently it seems

                                        Comment

                                        Working...
                                        X